- Introduction
- Administration & Management
- Interface Configuration
- Layer 3 Configurations
- Security Policy
- NAT
- App-ID™
- Content-ID™
- Authentication Profiles
- User-ID™
- Decryption
- VPN
- Reports and Logs
- High Availability
- Panorama
1. Introduction
2. Administration & Management
- Using GUI
- Using CLI Password Management
- Certificate Management
- Log Forwarding
- PAN-OS & Software Update
3. Interface Configuration
- VLAN Objects
- QoS
- Virtual Wire
- Tap
- Sub interfaces
- Security Zones
4. Layer 3 Configurations
- Advance NAT Features
- IPv6 Overview
- Policy Based Forwarding
- Routing Protocols (OSPF)
- Interface Management
- Service Routes
- DHCP
- Virtual Routers
5. Security Policy
- Policy Objects
- Defining Security Policy
- DMZ
6. NAT
- Source and Destination NAT
- NAT Policy Configuration
7. App-ID™
- App-ID Process
- Security Policy Configuration
- Policy Administration
- Defining new Application Signatures
- Application Override
8. Content-ID™
- Antivirus
- Anti-spyware
- Vulnerability
- URL Filtering
- File Blocking: WildFire™
- Zone Protection
- Custom Threat Signatures
- Data Filtering
- DoS Protection
- Botnet Report
9. Authentication Profiles
- Setting Up Authentication Profiles
- Creating a Local User Database
- Configuring RADIUS Server Settings
- Configuring LDAP Server Settings
- Configuring Kerberos Settings
10. User-ID™
- User-ID Agent
- Enumerating Users
- Mapping Users to IP
- Captive Portal
- LDAP Integration
- Users in Security Policy
11. Decryption
- SSL Inbound and Outbound
12. VPN
- Virtual Private Networks-Intro
- VPN Tunnels
- IPSec and IKE
- IPSec and IKE Crypto Profiles
- Setting Up IPSec VPNs
- Defining IKE Gateways
- Setting Up IPSec Tunnels
- Defining IKE Crypto Profiles
- Defining IPSec Crypto Profiles
- Viewing IPSec Tunnel Status on the Firewall
13. Reports and Logs
- Logging Configuration
- Scheduling Log Exports
- Defining Configuration Log Settings
- Defining System Log Settings
- Defining HIP Match Log Settings
- Defining Alarm Log Settings
- Managing Log Settings
- Configuring Syslog Servers
- Custom Syslog Field Descriptions
14. High Availability
- Configuring Active/Active HA
15. Panorama
- Device Groups & Templates
- Shared Policy
- Config Management
- Reporting and Log Collection